Overview
Due to increase in number of mobile, ubiquitous, cloud, network and communication applications & studies, the security issues and pivotal challenges include integrity verification, authentication, access control, attack prevention, etc., are also increasing. Recently, security technologies are booming. However, to achieve the whole security target for above-mentioned Computing and technologies, it requires much more than the mere applications of current core technologies. The main purpose of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology in Mobile Commerce, Cloud Computing, Network and Communication, particularly aiming to promote state-of-the-art research in these areas.
Topics
Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas of Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS), but are not limited to:
- Network Mobility Security
- Mobile Agent Security
- Cloud Security
- RFID Security
- Handover Security
- VoIP Security
- Cell Phone, PDA and Portable Device Security
- Mobile, Ad Hoc and Sensor Network Security
- 3G ~ 4G Communication Security
- Motion Detection and Tracing
- Access Control, Authentication and Authorization for MCNCS
- Cryptography, Cryptanalysis and Digital Signatures for MCNCS
- Key Management and Recovery for MCNCS
- Trust Negotiation, Establishment and Management for MCNCS
- Network Management for MCNCS
- Performance Evaluation for MCNCS
- Privacy, Data Integrity and Data Protection for MCNCS
- Computer Forensics for MCNCS
- Security Threats and Countermeasures for MCNCS
- Cross-layer Design for MCNCS